Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. Abbasi, A., Wetzels, J., Holz, T., & Etalle, S. CoRR, 2020.
Paper bibtex 2 downloads @article{DBLP:journals/corr/abs-2007-02307,
author = {Ali Abbasi and
Jos Wetzels and
Thorsten Holz and
Sandro Etalle},
title = {Challenges in Designing Exploit Mitigations for Deeply Embedded Systems},
journal = {CoRR},
volume = {abs/2007.02307},
year = {2020},
url = {https://arxiv.org/abs/2007.02307},
eprinttype = {arXiv},
eprint = {2007.02307},
timestamp = {Mon, 10 May 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2007-02307.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 2
{"_id":"KKpukLDih5T8eps3C","bibbaseid":"abbasi-wetzels-holz-etalle-challengesindesigningexploitmitigationsfordeeplyembeddedsystems-2020","author_short":["Abbasi, A.","Wetzels, J.","Holz, T.","Etalle, S."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Ali"],"propositions":[],"lastnames":["Abbasi"],"suffixes":[]},{"firstnames":["Jos"],"propositions":[],"lastnames":["Wetzels"],"suffixes":[]},{"firstnames":["Thorsten"],"propositions":[],"lastnames":["Holz"],"suffixes":[]},{"firstnames":["Sandro"],"propositions":[],"lastnames":["Etalle"],"suffixes":[]}],"title":"Challenges in Designing Exploit Mitigations for Deeply Embedded Systems","journal":"CoRR","volume":"abs/2007.02307","year":"2020","url":"https://arxiv.org/abs/2007.02307","eprinttype":"arXiv","eprint":"2007.02307","timestamp":"Mon, 10 May 2021 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/corr/abs-2007-02307.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-2007-02307,\n author = {Ali Abbasi and\n Jos Wetzels and\n Thorsten Holz and\n Sandro Etalle},\n title = {Challenges in Designing Exploit Mitigations for Deeply Embedded Systems},\n journal = {CoRR},\n volume = {abs/2007.02307},\n year = {2020},\n url = {https://arxiv.org/abs/2007.02307},\n eprinttype = {arXiv},\n eprint = {2007.02307},\n timestamp = {Mon, 10 May 2021 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-2007-02307.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Abbasi, A.","Wetzels, J.","Holz, T.","Etalle, S."],"key":"DBLP:journals/corr/abs-2007-02307","id":"DBLP:journals/corr/abs-2007-02307","bibbaseid":"abbasi-wetzels-holz-etalle-challengesindesigningexploitmitigationsfordeeplyembeddedsystems-2020","role":"author","urls":{"Paper":"https://arxiv.org/abs/2007.02307"},"metadata":{"authorlinks":{}},"downloads":2},"bibtype":"article","biburl":"https://dblp.org/pid/73/2297-2.bib","dataSources":["9RRnqWppvSHbtx7rD","7whi7meiPSmyTF8Y3","eqGZWjgQsJSxuxEGv"],"keywords":[],"search_terms":["challenges","designing","exploit","mitigations","deeply","embedded","systems","abbasi","wetzels","holz","etalle"],"title":"Challenges in Designing Exploit Mitigations for Deeply Embedded Systems","year":2020,"downloads":2}